Key management in old digital voice modes was tedious. Back before we had fully descended into a fascist state, the added complexity was deemed high risk for anything besides sensitive tactical comms. Even with modern networked systems, managing the encryption layer isn’t trivial, and there’s a high chance that radios from different departments won’t immediately be able to subscribe to another agency’s repeater node until the right tech gets on site.
Key management in old digital voice modes was tedious. Back before we had fully descended into a fascist state, the added complexity was deemed high risk for anything besides sensitive tactical comms. Even with modern networked systems, managing the encryption layer isn’t trivial, and there’s a high chance that radios from different departments won’t immediately be able to subscribe to another agency’s repeater node until the right tech gets on site.